Class 10
E N D
Presentation Transcript
Class 10 • Mention about class on Tuesday • Show Challenger movie • Discussion Writing Arguments Mary Jean Harrold
Quick Quiz • Give one example of the kind of information that the U.S. government restricted or prohibited during World War II out of concern that it might contain encoded information. • What is the main difference between the Communications Assistance for Law Enforcement Act (CALEA) and the wiretapping capability the government had before? • What is Carnivore? • What kind of information does Echelon collect? • What was the effect of the U.S. government’s restrictions on export of strong cryptography in the 1990s? Mary Jean Harrold
Quick Quiz • Give one example of the kind of information that the U.S. government restricted or prohibited during World War II out of concern that it might contain encoded information. • Were these actions paranoia on the part of the government or a reasonable precaution to protect the lives and freedom of Americans? • How relevant are such restrictions to time of peace, or wars on drugs, or wars against terrorists? • What such restrictions (if any) have you seen since 9/11? • What is the main difference between the Communications Assistance for Law Enforcement Act (CALEA) and the wiretapping capability the government had before? • Note: passed in 1994; required that technology used in communications systems be redesigned, and existing equipment modified, to ensure the ability of law-enforcement agencies to intercept communications. • Support your opinion on this Act. Mary Jean Harrold
Quick Quiz • What is Carnivore? • Note: FBI’s system for intercepting e-mail; now called DCS1000 • According to the FBI, why is it needed? • According to critics, what are the problems with it? • Should the FBI be allowed to continue use of it? Support your view. • What kind of information does Echelon collect? • What are controversial aspects of Echelon? Mary Jean Harrold
Quick Quiz • What was the effect of the U.S. government’s restrictions on export of strong cryptography in the 1990s? • What was Phil Zimmerman suspected of doing that was illegal (PGP: Pretty Good Privacy) • What is one use of encryption other than keeping messages secret? • What is public key cryptography? Why is it especially suited for e-commerce on the Internet? Mary Jean Harrold